Internet Engineering Task Force (IETF) A. Durand
Request for Comments: 6302 Juniper Networks
BCP: 162 I. Gashinsky
Category: Best Current Practice Yahoo! Inc.
ISSN: 2070-1721 D. Lee
Facebook, Inc.
S. Sheppard
ATT Labs
June 2011
Logging Recommendations for Internet-Facing Servers
Abstract
In the wake of IPv4 exhaustion and deployment of IP address sharing
techniques, this document recommends that Internet-facing servers log
port number and accurate timestamps in addition to the incoming IP
address.
Status of This Memo
This memo documents an Internet Best Current Practice.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
BCPs is available in Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6302.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Durand, et al. Best Current Practice [Page 1]
RFC 6302 Internet-Facing Server Logging June 2011
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . . 3
3. ISP Considerations . . . . . . . . . . . . . . . . . . . . . . 4
4. Security Considerations . . . . . . . . . . . . . . . . . . . . 4
5. References . . . . . . . . . . . . . . . . . . . . . . . . . . 4
5.1. Normative references . . . . . . . . . . . . . . . . . . . 4
5.2. Informative references . . . . . . . . . . . . . . . . . . 4
1. Introduction
The global IPv4 address free pool at IANA was exhausted in February
2011. Service providers will now have a hard time finding enough
IPv4 global addresses to sustain product and subscriber growth. Due
to the huge existing global infrastructure, both hardware and
software, vendors, and service providers must continue to support
IPv4 technologies for the foreseeable future. As legacy applications
and hardware are retired, the reliance on IPv4 will diminish;
however, this is a process that will take years, perhaps decades.
To maintain legacy IPv4 address support, service providers will have
little choice but to share IPv4 global addresses among multiple
customers. Techniques to do so are outside of the scope of this
document. All include some form of address translation/address
sharing, being NAT44 [RFC3022], NAT64 [RFC6146] or DS-Lite [DS-LITE].
The effects on the Internet of the introduction of those address
sharing techniques have been documented in [RFC6269].
Address sharing techniques come with their own logging infrastructure
to track the relation between which original IP address and source
port(s) were associated with which user and external IPv4 address at
any given point in time. In the past, to support abuse mitigation or
public safety requests, the knowledge of the external global IP
address was enough to identify a subscriber of interest. With
address sharing technologies, only providing information about the
external public address associated with a session to a service
provider is no longer sufficient information to unambiguously
identify customers.
Note: This document provides recommendations for Internet-facing
servers logging incoming connections. It does not provide any
recommendations about logging on carrier-grade NAT or other address
sharing tools.
Durand, et al. Best Current Practice [Page 2]
RFC 6302 Internet-Facing Server Logging June 2011
2. Recommendations
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
It is RECOMMENDED as best current practice that Internet-facing
servers logging incoming IP addresses from inbound IP traffic also
log:
o The source port number.
o A timestamp, RECOMMENDED in UTC, accurate to the second, from a
traceable time source (e.g., NTP [RFC5905]).
o The transport protocol (usually TCP or UDP) and destination port
number, when the server application is defined to use multiple
transports or multiple ports.
Discussion: Carrier-grade NATs may have different policies to recycle
ports; some implementations may decide to reuse ports almost
immediately, some may wait several minutes before marking the port
ready for reuse. As a result, servers have no idea how fast the
ports will be reused and, thus, should log timestamps using a
reasonably accurate clock. At this point, the RECOMMENDED accuracy
for timestamps is to the second or better. Representation of
timestamps in UTC is preferred to local time with UTC-offset or time
zone, as this extra information can be lost in the reporting chain.
Examples of Internet-facing servers include, but are not limited to,
web servers and email servers.
Although the deployment of address sharing techniques is not foreseen
in IPv6, the above recommendations apply to both IPv4 and IPv6, if
only for consistency and code simplification reasons.
Discussions about data-retention policies are out of scope for this
document. Server security and transport security are important for
the protection of logs for Internet-facing systems. The operator of
the Internet-facing server must consider the risks, including the
data and services on the server, to determine the appropriate
measures. The protection of logs is critical in incident
investigations. If logs are tampered with, evidence could be
destroyed.
The above recommendations also apply to devices such as load-
balancers logging incoming connections on behalf of actual servers.
Durand, et al. Best Current Practice [Page 3]
RFC 6302 Internet-Facing Server Logging June 2011
The above recommendations apply to current logging practices. They
do not require any changes in the way logging is performed; e.g.,
which packets are examined and logged.
3. ISP Considerations
ISP deploying IP address sharing techniques should also deploy a
corresponding logging architecture to maintain records of the
relation between a customer's identity and IP/port resources
utilized. However, recommendations on this topic are out of scope
for this document.
4. Security Considerations
In the absence of the source port number and accurate timestamp
information, operators deploying any address sharing techniques will
not be able to identify unambiguously customers when dealing with
abuse or public safety queries.
5. References
5.1. Normative references
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
5.2. Informative references
[DS-LITE] Durand, A., Droms, R., Woodyatt, J., and Y. Lee, "Dual-
Stack Lite Broadband Deployments Following IPv4
Exhaustion", Work in Progress, May 2011.
[RFC3022] Srisuresh, P. and K. Egevang, "Traditional IP Network
Address Translator (Traditional NAT)", RFC 3022,
January 2001.
[RFC5905] Mills, D., Martin, J., Burbank, J., and W. Kasch, "Network
Time Protocol Version 4: Protocol and Algorithms
Specification", RFC 5905, June 2010.
[RFC6146] Bagnulo, M., Matthews, P., and I. van Beijnum, "Stateful
NAT64: Network Address and Protocol Translation from IPv6
Clients to IPv4 Servers", RFC 6146, April 2011.
[RFC6269] Ford, M., Ed., Boucadair, M., Durand, A., Levis, P., and
P. Roberts, "Issues with IP Address Sharing", RFC 6269,
June 2011.
Durand, et al. Best Current Practice [Page 4]
RFC 6302 Internet-Facing Server Logging June 2011
Authors' Addresses
Alain Durand
Juniper Networks
1194 North Mathilda Avenue
Sunnyvale, CA 94089-1206
USA
EMail: adurand@juniper.net
Igor Gashinsky
Yahoo! Inc.
45 West 18th St.
New York, NY 10011
USA
EMail: igor@yahoo-inc.com
Donn Lee
Facebook, Inc.
1601 S. California Ave.
Palo Alto, CA 94304
USA
EMail: donn@fb.com
Scott Sheppard
ATT Labs
575 Morosgo Ave, 4d57
Atlanta, GA 30324
USA
EMail: Scott.Sheppard@att.com
Durand, et al. Best Current Practice [Page 5]